Homework 4 Chapter 4: How Do Switches and Routers Find Paths

droppercauseNetworking and Communications

Oct 28, 2013 (3 years and 9 months ago)

82 views




Homework 4

Chapter 4: How Do Switches and Routers Find Paths




1.

Routers and bridges use the concept of metric or cost.


2.

Discuss how routers and bridges use path determination. What are the
differences?


Routers evaluate the metric of an entire end
-
to
-
end route or path. Bridges take a
more local forwarding view than do routers.


3.

Routing Protocols provide information for forwarding the packets of a routed
protocol.


4.

List the Dynamic routing protocols.


Routing Information Protocol (RIP)

Interior Gateway

Routing Protocol (IGRP)

Enhanced Interior Gateway Routing Protocol (EIGRP)

Intermediate System to Intermediate System (IS
-
IS)

Border Gateway Protocol (BGP)


5.

What does a router have to do before it forwards?


Obtain information about potential routes

Parti
cipate in exchanges for dynamic routing protocols

Install the best of these routes in the RIB.

Look up the destination address of incoming packets in the FIB.


6.

Can a RIB apply filtering?


Yes, it can


as an option


7.

Define the Classic Route Lookup Criteria
.


The Classic Route Lookup Criteria consists of four parts:



1. Basic Match: The network address prefix is extracted from the packet.
Any non
-
matching route is rejected.


2. Longest Match: If there are multiple routes that match the basic match,
the rou
te with the highest number of matching bits is selected.


3. Weak Type of Service: Although outdated, the TOS bit fields in the IP
header are considered for packet prioritization. This does not affect the route
selected.


4. Best metric: Routes are assign
ed metrics based on either administrative
distance for distance vector routing protocols or factors such as hop count,
bandwidth utilization, MTU, etc for link state protocols. The route with the best
metric is chosen. The best metric is usually the lowe
st metric.


8.

What is a default route?


A default route is the route selected when there are no other matching routes in
the routing table. If there is no default route set, a “Destination unreachable”
ICMP message is returned.


9.

What is the address of the d
efault route?


Address: 0.0.0.0 Mask: 0.0.0.0 Next Hop:
Next Hop address here
.


In CIDR notation: 0.0.0.0/0.


10.

Layer 3 addresses have two levels of hierarchy. What are they?


Prefix and Host


11.

Does a routing table cause problems because of the size? Why an
d what can you
do?


The size of a routing table can cause problems due to increased router CPU
utilization as the table grows. Without a hierarchy, it is necessary to search every
address table in the domain. Large routing tables also cause problems with

slow
convergence in routing protocols.


Default routes and route summarization are two methods of controlling the size of
routing tables. Default routes assume that an upstream router knows more about
the desired path than it does and so it forwards pack
ets bound for unknown
addresses to the default route.


12.

Draw and discuss a default routing scenario.



Figure
1
: Default routing scenario




13.

How do routes get installed in the RIB?


A route must pass thr
ough acceptance filters. The RIB is checked for duplicates
and assuming none are found the route is inserted into the RIB.


14.

What does administrative distance mean? What number takes on the higher
priority?


Administrative distance is the preference given

to a route. Administrative
distances are numbered from 0


255. 0 means that a route is directly connected
or is referenced by interface. Static routes usually an administrative distance of 1.
Different routing protocols have different metrics though
they can be changed if
necessary although doing so without very good reason is not recommended.


15.

What must routes have to be considered for load sharing?


Routes must have the same administrative distance and must have the same metric
if placed in the RIB
by a dynamic routing protocol.


16.

List the factors used in computing metrics.


Link bandwidth, link delay, Administrative preferences, link error rate, and link
utilization.


17.

What is a quasi
-
static route?


Quasi
-
static routes are static routes with differen
t administrative preferences that
can be used for load
-
sharing.


18.

Do quasi
-
static routes need to be configured?


Quasi
-
static routes must be manually configured.


19.

What can you do to administer your edge routers?


1. Try very hard to avoid duplicate static r
outes.

2. Automate the updating of your router configurations using configurations
created from your user address assignment database and loaded via tftp.

3. Generate human readable reports for troubleshooting and address allocation
justification.


20.

Define
Layer 2 Paths


Layer 2 Paths specify where not to go to find a particular destination. Frames are
forwarded over interfaces that are not blocked by the spanning tree algorithm.


21.

What are Layer 2 Paths used for?


Layer 2 paths use the spanning tree algori
thm to block forwarding in such a manner
as to prevent looping.


22.

Discuss the Spanning Tree Algorithm and how priority in the bridges are
determined.


The Spanning Tree algorithm is initiated by setting all ports to blocking. As ports
come on
-
line, they ar
e transitioned from a blocking state to a Learning /
Forwarding state and finally to a listening state. Priorities in bridges are
determined by concatenating the priority number and bridge ID. This is
compared among adjacent bridges and the lowest priori
ty/bridge ID combination
is given priority. The bridge with the highest overall priority is the root bridge.


23.

How are routes discovered using VLANs and ELANs?


There are no special path determination processes. VLANs and ELANs
encapsulate a payload proto
col and associate it with a VLAN identifier.


24.

List the tunneling components.


1. Original payload information

2. Tunneling information

3. Delivery protocol


25.

What is a trunk?


A trunk is a path between switches or bridges that can differentiate between
mul
tiple VLANs on the same link.


26.

What are the two kinds of VLAN trunking?


1. Tunneling method

2. VLAN tagging